Recently, a news story came out concerning a rash of break-ins at the Congressional offices located in Washington, DC. Items stolen included computer equipment, personal property, items left in care and possibly confidential or private data. The investigation is still ongoing. One might assume government offices are immune to burglaries or thieves given the high level of security deployed. However, this is not the case.
Today many people enjoy the convenience of using their laptops or USB flash disks to hold and carry information. These devices are small and easy to use. By nature of their compact size these devices can be easily lost or stolen.
Sometimes a company may allow employees to use their laptops or flash disks to carry company data that can be accessed outside of the office to work on various projects at their leisure. This practice may seem benign, but what happens if flash disks or laptop is lost or stolen? Many companies do install devices to track laptops if they are lost or stolen, but these devices usually do not deploy technology to protect the data stored on laptops. The question becomes which is more important, the laptop or the data stored? Voraussetzungen Datenschutzbeauftragter
In today’s complex information age, protecting one’s information and privacy has never been more important. One would expect major corporations holding our data, like licensing bureaus, healthcare companies and high level government offices to protect our data, but this is not always the case. Accidents do happen and sometimes the theft of personal, private or confidential data can leave an individual or company very vulnerable.
Biometrics is a leading technology which utilizes an individual’s unique biological identity to provide an accurate identification of the individual. Each person has unique iris and fingerprint signatures which biometrics technology uses to employ sophisticated algorithms to confirm ones identity.
Though, biometric technology is considered very high-tech, applications used are usually quite simple and involve either a simple retinal eye scan to confirm identity or a person simply swiping their finger on a scanner type device. Though, biometrics is not a common household name, the security provided by the use of Biometric technology is unquestionable when compared to the potential damaged which can be caused by not securing governmental offices, confidential or private data Voraussetzung interner Datenschutzbeauftragter.
Personal information stored on a USB flash disk, if stolen or lost, can potentially compromised the rightful owner. Hopefully a “good Samaritan” will find the lost disk and return it back to rightful owner. However, the lost disk could also end up in the possession of an identity thief who can use the unprotected data on the flash disk to his advantage. Given unrestricted access to the data an identity thief can seriously compromise the rightful owner.
It is not uncommon for people to carry information on laptops or flash disks like their names, address information on letters written, financial information on spread sheets, telephone numbers, e-mail addresses and even credit card numbers. This information is absolutely gold to an identity thief.
For example, if identity thieves manage to secure your Social Security number they could use this information to get a job, rent a house and even secure a bank account. An identify thief could use stolen information to give to police during an arrest. If they do not show up for their court date, a warrant for arrest could be issued in the assumed name. Thereby the true owner of the data is comprised. Sometimes the damage can be undone, but this would take time and could lead to personal embarrassment Wer eignet sich als interner Datenschutzbeauftragter?.
By using biometric applications one can at least limit the potential damage, which can be caused if data stored is lost or stolen because the data cannot be accessed without the owner’s unique biometric signature, i.e. fingerprint.
Computerized technologies offer many benefits to people and society overall. However, one must also be vigilant in protecting both personal and private information which can lead to potential problems, some with serious consequences.